官术网_书友最值得收藏!

Security considerations for the functional viewpoint

Following are some of the security consideration for the functional viewpoint:

  • Security audit: To collect, store, and analyze security-related information.
  • Identity verification: In communications, it protects the integrity of communications within the IIoT system.
  • Cryptographic support: This involves software and hardware for encryption and decryption.
  • Data protection and privacy: This protects sensitive and personal information, both at rest and while in transit. Data protection requirements are defined by a security policy, and should be in keeping with organizational and regulatory requirements.
  • Authentication and identity management: This ensures users only have access to the functions and data for which they are authorized.
  • Physical protection: This enforces security policies to prevent tampering and unauthorized observation.
主站蜘蛛池模板: 元江| 清镇市| 新宁县| 图们市| 黎川县| 五原县| 杂多县| 北碚区| 鲁山县| 万全县| 南涧| 台山市| 城市| 阳春市| 闽清县| 乐山市| 扎鲁特旗| 全州县| 黄浦区| 紫金县| 大方县| 伊宁县| 嵊州市| 鹤庆县| 手游| 故城县| 韶山市| 上高县| 徐闻县| 淅川县| 崇州市| 普定县| 涟源市| 肇源县| 寿光市| 罗田县| 吉安市| 洪江市| 崇阳县| 太康县| 鲜城|